XeBrandon's profile

New Poster

 • 

1 Message

Monday, December 28th, 2020 1:00 PM

Closed

TCP Port Scan originating from Russia!?

Bellow are the logs from my router, what’s very interesting to me is that each scan request was done with a unique IP address each residing in Russia. I guess I’m just asking for some clarification/making a report of this because this is my residential router and not sure why it would be targeted by port scan from a bunch of unique Russian IPs

[DoS attack: TCP Port Scan] from source: 193.27.229.93:57919 Monday, December 28,2020 12:02:35
[DoS attack: TCP Port Scan] from source: 46.148.233.52:58577 Monday, December 28,2020 11:35:06
[DoS attack: TCP Port Scan] from source: 46.148.233.30:56576 Monday, December 28,2020 11:29:16
[DoS attack: TCP Port Scan] from source: 46.148.233.55:59198 Monday, December 28,2020 11:27:04
[DoS attack: TCP Port Scan] from source: 46.148.233.50:58480 Monday, December 28,2020 11:24:45
[DoS attack: TCP Port Scan] from source: 46.148.233.58:58922 Monday, December 28,2020 11:23:12
[DoS attack: TCP Port Scan] from source: 46.148.233.38:57157 Monday, December 28,2020 11:22:52
[DoS attack: TCP Port Scan] from source: 46.148.233.32:56816 Monday, December 28,2020 11:20:18
[DoS attack: TCP Port Scan] from source: 46.148.233.33:56935 Monday, December 28,2020 11:15:49
[DoS attack: TCP Port Scan] from source: 46.148.233.46:58120 Monday, December 28,2020 11:15:40
[DoS attack: TCP Port Scan] from source: 46.148.233.43:57404 Monday, December 28,2020 11:14:27
[DoS attack: TCP Port Scan] from source: 46.148.233.44:57559 Monday, December 28,2020 11:13:57
[DoS attack: TCP Port Scan] from source: 46.148.233.45:58000 Monday, December 28,2020 11:12:20
[DoS attack: TCP Port Scan] from source: 46.148.233.57:59114 Monday, December 28,2020 11:11:09
[DoS attack: TCP Port Scan] from source: 46.148.233.61:59407 Monday, December 28,2020 11:10:50
[DoS attack: TCP Port Scan] from source: 92.42.15.131:59782 Monday, December 28,2020 11:08:25
[DoS attack: TCP Port Scan] from source: 46.148.233.51:58206 Monday, December 28,2020 11:06:02
[DoS attack: TCP Port Scan] from source: 46.148.233.31:59874 Monday, December 28,2020 11:05:44
[DoS attack: TCP Port Scan] from source: 46.148.233.48:58765 Monday, December 28,2020 11:02:27
[DoS attack: TCP Port Scan] from source: 46.148.233.54:58886 Monday, December 28,2020 11:01:42
[DoS attack: TCP Port Scan] from source: 46.148.233.62:59337 Monday, December 28,2020 11:01:40
[DoS attack: TCP Port Scan] from source: 46.148.233.42:57310 Monday, December 28,2020 11:01:23
[DoS attack: TCP Port Scan] from source: 46.148.233.49:58653 Monday, December 28,2020 11:01:05
[DoS attack: TCP Port Scan] from source: 46.148.233.60:59553 Monday, December 28,2020 10:55:13
[DoS attack: TCP Port Scan] from source: 195.54.161.122:52178 Monday, December 28,2020 10:41:11

This conversation is no longer open for comments or replies and is no longer visible to community members.

Problem Solver

 • 

1.5K Messages

5 years ago

Ha.  You should see my "Heat Maps" of all the hits on my firewall.

 

I get a lot of China, but also Viet Nam as far as asia pacific goes.  Less from South America, but there.  Russia shows up, and everyone on the wandoo.fr (France)network must be compromised too.

 

For US sources, you'll find everyone's gramma is part of a botnet from clicking on the 'cute cat' images on dorkbook, and there's a lot of compromised cloud servers on providers like Eonix and Digital Ocean.

 

Yep.  They're portscanning you looking for a router or service exploit.  All the script kids run the same tools.

Expert

 • 

111.5K Messages

5 years ago

@XeBrandon 

 

FWIW, this kind of internet background noise will never be stopped. Your firewall is doing its job ! Don't sweat it.

forum icon

New to the Community?

Start Here